BitRaser Mobile Eraser & Diagnostics
BitRaser Mobile Eraser & Diagnostics
BitRaser Mobile Eraser & Diagnostics / 4. Working with BitRaser Mobile Eraser & Diagnostics / 4.2. Erasure Stages / 4.2.1. Erasure Process
BitRaser Mobile Eraser & Diagnostics is a reliable application providing permanent Data Erasure for iPhones, iPads, Apple Watches and Android devices. Using the BitRaser Data Erasure process, data once erased cannot be recovered. This ensures that sensitive data does not fall into the wrong hands when mobile devices are disposed of, recycled, or sold. You can also generate an erasure report containing the results of the process. The report can be saved to a hard drive/external media or collected by the BitRaser Cloud Console. The application allows you to connect, erase, or diagnose multiple devices at once.
Read the data erasure process suitable for your device:
BitRaser Mobile Eraser & Diagnostics provides 11 data erasure methods. You can select any one of the following erasure methods for both Android and iOS devices:
Erasure Methods |
Description |
NIST 800-88 Clear |
This algorithm wipes data by overwriting the HDD or SSD drives using the Cryptographic Erase (CE) of a Self-Encrypting Drive (SED). |
Native OS Erasure |
This is the default algorithm available to the users in the device's OS. |
Zeroes |
This algorithm wipes data by overwriting it with zeros in a single pass. This is the fastest algorithm available to a user. |
Pseudo-random (1 pass) |
This algorithm wipes data by overwriting an entire device with randomly generated numbers in a single pass. |
US Department of Defense, DoD 5220.22-M (3 passes) |
This algorithm wipes data by overwriting the device in three passes. In the first pass, it overwrites data with zeros, then in the second pass, it overwrites the data with ones, and finally in the third pass overwrites the data with randomly generated bytes. This is a U.S. Department of Defense algorithm. |
US Department of Defense, DoD 5200.22-M (ECE) (7 passes) |
This algorithm wipes data by overwriting the device in seven passes. The first, fourth, and fifth pass are overwriting with a random byte, its 8 right-bit shift complement, and 16 right-bit shift complement; second and sixth passes are overwriting with zeros, and third and seventh pass with random data. This is a U.S. Department of Defense algorithm. |
B.Schneier's algorithm (7 passes) |
This algorithm wipes data in seven passes. In the first two passes, it overwrites the device with ones and then zeros, and in the next five passes, it overwrites data with random characters. |
Peter Gutmann (35 passes) |
This algorithm wipes data by overwriting it 35 times, making recovery of the wiped data by any tool impossible. This algorithm takes more time than other wiping algorithms. |
US-Army AR 380-19 (3 passes) |
This algorithm wipes data by overwriting the media in three passes. In the first pass, it overwrites data with random bytes, then in the second and third pass, it overwrites data with certain bytes and their complements. This is a U.S. Army algorithm. |
US Air Force, AFSSI 5020(3 passes) |
This algorithm wipes data by overwriting the media in three passes. First, it overwrites with zeros, then with ones, and finally with random characters. |
British HMG IS5 (3 passes) |
This algorithm is a three pass overwriting algorithm, first pass - with zeros, the second pass–with ones and the last pass with random data. |
Note: The algorithms mentioned above are not applicable for Apple Watches.